File size: 5,144 Bytes
6129d1a 5839d23 6129d1a 9b39b8c 6129d1a 5839d23 9b39b8c 6129d1a 5839d23 9b39b8c | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | ---
title: Attack Path Visualizer
emoji: πΊοΈ
colorFrom: red
colorTo: purple
sdk: gradio
sdk_version: 5.50.0
python_version: '3.10'
app_file: app.py
pinned: false
license: apache-2.0
tags:
- cybersecurity
- attack-path
- mitre-attack
- visualization
- threat-modeling
- red-team
- pentest
datasets:
- AYI-NEDJIMI/mitre-attack-fr
- AYI-NEDJIMI/mitre-attack-en
---
# πΊοΈ Attack Path Visualizer
A comprehensive interactive visualization tool for cybersecurity attack chains and threat modeling. Perfect for security professionals, red teamers, and defensive teams.
## Features
- **10 Common Attack Scenarios** - Realistic attack chains covering major threat categories
- **MITRE ATT&CK Mapping** - All techniques mapped to official MITRE ATT&CK framework
- **Interactive Flowcharts** - Color-coded attack phases with clickable nodes
- **Bilingual Support** - English and French interfaces
- **Phase Breakdown Analysis** - Visual charts showing attack phase distribution
- **Detailed Stage Information** - Description and MITRE technique details for each step
## Attack Paths Included
1. **Classic AD Domain Compromise** - Phishing β Macro β Credential Dump β Lateral Movement β Domain Admin β Data Exfil
2. **Web App to Internal Network** - SQLi β Web Shell β Reverse Shell β Network Recon β Database Access β Exfil
3. **Cloud Account Takeover** - Credential Stuffing β MFA Bypass β API Token Theft β Privilege Escalation β Data Access
4. **Ransomware Kill Chain** - Phishing β Malware β C2 β Reconnaissance β Lateral Movement β Encryption
5. **Supply Chain Attack** - Compromised Dependency β Code Injection β Distribution β C2 β Persistence β Exfil
6. **Insider Threat - Data Theft** - Legitimate Access β Privilege Escalation β Data Discovery β Exfiltration β Cover Tracks
7. **NTLM Relay Attack** - LLMNR Poisoning β NTLM Capture β Relay β Shell Access β Persistence
8. **Kerberos Attack Chain** - SPN Enumeration β Kerberoasting β Pass-the-Hash β DCSync β Hash Extraction
9. **Web API Exploitation** - API Enumeration β Auth Bypass β IDOR β Parameter Tampering β Bulk Export
10. **Zero-Day Exploitation** - Reconnaissance β Zero-Day Discovery β Exploit β C2 β Rootkit β Long-term Theft
## Color Legend
- π΄ **Red** - Initial Access
- π **Orange** - Execution
- π‘ **Yellow** - Credential Access
- π΅ **Blue** - Lateral Movement
- π£ **Purple** - Privilege Escalation
- π· **Teal** - Persistence
- π΄ **Pink** - Command & Control
- β« **Black** - Exfiltration
- π₯ **Dark Red** - Impact
## Use Cases
- **Threat Modeling** - Understand realistic attack chains for your environment
- **Red Team Training** - Train defensive teams on threat scenarios
- **Incident Response** - Map detected activities to known attack patterns
- **Security Awareness** - Educate employees on attack progression
- **Compliance Documentation** - Demonstrate threat understanding for audits
- **LinkedIn Sharing** - Create awareness-raising content about cybersecurity
## Technology
- **Gradio** - Web interface framework
- **Plotly** - Interactive visualization and charts
- **Python** - Backend logic
## Installation
```bash
pip install -r requirements.txt
python app.py
```
## How to Use
1. Select an attack path from the dropdown menu
2. Choose your language (English or FranΓ§ais)
3. View the interactive attack flowchart
4. Read the attack description and statistics
5. Review the phase breakdown analysis
6. Examine detailed information for each attack stage
## MITRE ATT&CK Integration
All attack paths are mapped to official MITRE ATT&CK techniques. Hover over nodes to see:
- Technique name
- MITRE technique ID (e.g., T1566)
- Attack phase classification
Learn more: https://attack.mitre.org/
## Educational Purpose
This tool is designed for:
- β
Authorized security testing
- β
Defensive team training
- β
Threat modeling and risk assessment
- β
Security awareness and education
- β
Incident response planning
This tool should only be used in authorized environments.
## Security Notes
- Educational tool for authorized security professionals
- Based on publicly known attack techniques
- Use to improve defensive posture
- Share knowledge responsibly within your organization
## Resources
- [MITRE ATT&CK Framework](https://attack.mitre.org/)
- [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework)
- [OWASP Security Top 10](https://owasp.org/www-project-top-ten/)
- [CIS Critical Security Controls](https://www.cisecurity.org/controls/)
## Contributing
Suggestions for additional attack paths or improvements are welcome!
## License
Apache License 2.0
---
**Made with β€οΈ for the cybersecurity community**
Perfect for sharing on LinkedIn to raise awareness about cybersecurity threats and defense strategies.
---
**Powered by [AYI-NEDJIMI Consultants](https://ayinedjimi-consultants.fr)** - AI & Cybersecurity Consulting
- [All Datasets](https://huggingface.co/AYI-NEDJIMI)
- [AI & Cyberdefense Whitepaper](https://ayinedjimi-consultants.fr/livre-blanc-ia-cyberdefense.html)
|